<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GlobalProtect Cert+SAML in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-cert-saml/m-p/1246866#M7260</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm reaching out to see if anyone has configured GlobalProtect with cert+SAML authentication with multiple gateways across multiple firewalls.&amp;nbsp; I've been attempting to configure this, however, whenever I use cert+SAML at the gateway and I attempt to switch gateways after logging in, the logs always show "client cert not present".&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have both the root/intermediate configured under certificate and have an accompanying certificate profile with nothing special specifying those two certs.&amp;nbsp; I have both machine and user certs issued to the machine/user respectively.&amp;nbsp; App configuration is basic, setup with pre-logon (always-on) and is targeted for "any".&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For context, I'm able to perform cert-only authentication and if i set the subject-alt name to email in the profile, it authenticates both machine and user respectively for whichever stage its at and determines the correct user.&amp;nbsp; Likewise, with SAML only, everything works fine as well when switching gateways.&amp;nbsp; It's only when I combine cert with SAML that it fails.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't been able to find many resources with concrete information on whether this is supported or not, most videos I've seen only specify SAML at the gateway.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jan 2026 14:39:45 GMT</pubDate>
    <dc:creator>JordanAltmann</dc:creator>
    <dc:date>2026-01-28T14:39:45Z</dc:date>
    <item>
      <title>GlobalProtect Cert+SAML</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-cert-saml/m-p/1246866#M7260</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm reaching out to see if anyone has configured GlobalProtect with cert+SAML authentication with multiple gateways across multiple firewalls.&amp;nbsp; I've been attempting to configure this, however, whenever I use cert+SAML at the gateway and I attempt to switch gateways after logging in, the logs always show "client cert not present".&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have both the root/intermediate configured under certificate and have an accompanying certificate profile with nothing special specifying those two certs.&amp;nbsp; I have both machine and user certs issued to the machine/user respectively.&amp;nbsp; App configuration is basic, setup with pre-logon (always-on) and is targeted for "any".&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For context, I'm able to perform cert-only authentication and if i set the subject-alt name to email in the profile, it authenticates both machine and user respectively for whichever stage its at and determines the correct user.&amp;nbsp; Likewise, with SAML only, everything works fine as well when switching gateways.&amp;nbsp; It's only when I combine cert with SAML that it fails.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't been able to find many resources with concrete information on whether this is supported or not, most videos I've seen only specify SAML at the gateway.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 14:39:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-cert-saml/m-p/1246866#M7260</guid>
      <dc:creator>JordanAltmann</dc:creator>
      <dc:date>2026-01-28T14:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Cert+SAML</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-cert-saml/m-p/1247925#M7278</link>
      <description>&lt;P&gt;The "Client Cert Not Present" error during a gateway switch usually stems from a mismatch in how the session cookie handles the multi-factor requirement. When moving between firewalls, GlobalProtect attempts to use an Authentication Override cookie to maintain a seamless connection; however, if the new gateway is configured to strictly require a certificate handshake before accepting that SAML-based cookie, the process fails because the certificate isn't being re-presented during the cookie validation phase. To resolve this, ensure that all firewalls share the same Certificate Profile and have "Any" or "User/Machine" selected, and most importantly, verify that "Accept Cookie for Authentication" is enabled on all gateways with a matching Cookie Lifetime to allow the authenticated session to roam without triggering a fresh, manual certificate prompt.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 09:58:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-cert-saml/m-p/1247925#M7278</guid>
      <dc:creator>jim65richards</dc:creator>
      <dc:date>2026-02-11T09:58:12Z</dc:date>
    </item>
  </channel>
</rss>

